LEADER 04077oam 2200649 450 001 996465992003316 005 20210521141859.0 010 $a3-540-46088-8 024 7 $a10.1007/3-540-46088-8 035 $a(CKB)1000000000211735 035 $a(SSID)ssj0000317645 035 $a(PQKBManifestationID)11208031 035 $a(PQKBTitleCode)TC0000317645 035 $a(PQKBWorkID)10312388 035 $a(PQKB)10898911 035 $a(DE-He213)978-3-540-46088-6 035 $a(MiAaPQ)EBC3062478 035 $a(MiAaPQ)EBC6414002 035 $a(PPN)123720699 035 $a(EXLCZ)991000000000211735 100 $a20210521d2002 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 00$aFinancial cryptography $e5th International Conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2001 : proceedings /$fPaul F. Syverson (ed.) 205 $a1st ed. 2002. 210 1$aBerlin, Germany ;$aNew York, New York :$cSpringer,$d[2002] 210 4$d©2002 215 $a1 online resource (IX, 379 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v2339 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-44079-8 320 $aIncludes bibliographical references and index. 327 $aManaging Payment Transaction Costs -- Amortized E-Cash -- Offline Micropayments without Trusted Hardware -- Panel (I) -- The Practical Problems of Implementing MicroMint -- Protecting Digital Rights -- Aspects of Digital Rights Management and the Use of Hardware Security Devices -- A Solution to the Napster Phenomenon: Why Value Cannot Be Created Absent the Transfer of Subjective Data -- Golden Times for Digital Rights Management? -- Applicability of Public Key Cryptosystems to Digital Rights Management Applications -- Trust and Risk Management -- On the Global Content PMI: Improved Copy-Protected Internet Content Distribution -- Trust: A Collision of Paradigms -- Groups and Anonymity -- On the Security of Homage Group Authentication Protocol -- Anonymity without ?Cryptography? -- Fair Tracing without Trustees -- Invited Talk -- Why the War on Money Laundering Should Be Aborted -- Certificates and Authentication -- Provably Secure Implicit Certificate Schemes -- Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation -- Mutual Authentication for Low-Power Mobile Devices -- Credit Card Security -- Off-Line Generation of Limited-Use Credit Card Numbers -- A Security Framework for Card-Based Systems -- SecureClick: A Web Payment System with Disposable Credit Card Numbers -- Panel (II) -- The Business of Electronic Voting -- Markets and Multiparty Computation -- Privacy for the Stock Market -- Secure Distributed Computing in a Commercial Environment -- Signatures in Financial Cryptography -- Monotone Signatures -- The Power of RSA Inversion Oracles and the Security of Chaum?s RSA-Based Blind Signature Scheme -- Optimistic Fair Exchange with Transparent Signature Recovery -- Auctions -- (M + 1)st-Price Auction Protocol -- Non-interactive Private Auctions. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v2339 606 $aInternet$xSecurity measures$vCongresses 606 $aElectronic funds transfers$xSecurity measures$vCongresses 606 $aElectronic commerce$xSecurity measures$vCongresses 606 $aComputer networks$xSecurity measures$vCongresses 606 $aData encryption (Computer science)$vCongresses 615 0$aInternet$xSecurity measures 615 0$aElectronic funds transfers$xSecurity measures 615 0$aElectronic commerce$xSecurity measures 615 0$aComputer networks$xSecurity measures 615 0$aData encryption (Computer science) 676 $a332.1/0285 702 $aSyverson$b Paul F. 712 12$aFC 2001 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bUtOrBLW 906 $aBOOK 912 $a996465992003316 996 $aFinancial Cryptography$9772724 997 $aUNISA